Cargando…

Managing the human factor in information security : how to win over staff and influence business managers /

With the growth in social networking and the potential for larger and larger breaches of sensitive data, it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Lacey, David (David J.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Chichester, England ; Hoboken, N.J. : Wiley, ©2009.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn367588970
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 090601s2009 enka ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d EBLCP  |d YDXCP  |d IDEBK  |d E7B  |d CDX  |d OCLCQ  |d MHW  |d OCLCQ  |d FVL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d TEFOD  |d OCLCF  |d DEBSZ  |d OCLCA  |d DKDLA  |d OCLCA  |d OCLCQ  |d OCLCO  |d OCLCQ  |d B@L  |d TEFOD  |d OCLCQ  |d AZK  |d CNNLC  |d CNNOR  |d MOR  |d PIFAG  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d OCLCA  |d U3W  |d BRL  |d STF  |d LND  |d WRM  |d NRAMU  |d ICG  |d INT  |d VT2  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d HS0  |d OCLCQ  |d UHL  |d OCLCQ  |d INARC  |d VLY  |d OCLCO  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 647782742  |a 748207472  |a 748589303  |a 815765869  |a 872153641  |a 961537880  |a 962728754  |a 1037461557  |a 1113680451  |a 1162188910  |a 1290056367 
020 |a 9780470742082  |q (electronic bk.) 
020 |a 0470742089  |q (electronic bk.) 
020 |a 0470721995  |q (pbk. ;  |q alk. paper) 
020 |a 9780470721995  |q (pbk. ;  |q alk. paper) 
020 |a 1282022458 
020 |a 9781282022454 
020 |a 9786612022456 
020 |a 6612022450 
020 |z 9780470721995  |q (pbk. ;  |q alk. paper) 
029 1 |a AU@  |b 000045013088 
029 1 |a AU@  |b 000053263392 
029 1 |a DEBBG  |b BV044136471 
029 1 |a DEBSZ  |b 396265723 
029 1 |a NZ1  |b 14241608 
035 |a (OCoLC)367588970  |z (OCoLC)647782742  |z (OCoLC)748207472  |z (OCoLC)748589303  |z (OCoLC)815765869  |z (OCoLC)872153641  |z (OCoLC)961537880  |z (OCoLC)962728754  |z (OCoLC)1037461557  |z (OCoLC)1113680451  |z (OCoLC)1162188910  |z (OCoLC)1290056367 
037 |a 9BFBBB4C-7103-4E98-9387-0BF483D15EE3  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a HF5548.37  |b .L33 2009eb 
072 7 |a BUS  |x 097000  |2 bisacsh 
072 7 |a BUS  |x 104000  |2 bisacsh 
072 7 |a BUS  |x 071000  |2 bisacsh 
072 7 |a BUS  |x 103000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 22 
049 |a UAMI 
100 1 |a Lacey, David  |q (David J.)  |1 https://id.oclc.org/worldcat/entity/E39PCjxThCh8gw7ypX3hT8wDdP 
245 1 0 |a Managing the human factor in information security :  |b how to win over staff and influence business managers /  |c David Lacey. 
260 |a Chichester, England ;  |a Hoboken, N.J. :  |b Wiley,  |c ©2009. 
300 |a 1 online resource (xxiv, 374 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references (pages 353-356) and index. 
520 |a With the growth in social networking and the potential for larger and larger breaches of sensitive data, it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide f. 
588 0 |a Print version record. 
505 0 |a Managing the Human Factor in Information Security; Contents; Acknowledgements; Foreword; Introduction; 1 Power to the people; 2 Everyone makes a difference; 3 There's no such thing as an isolated incident; 4 Zen and the art of risk management; 5 Who can you trust?; 6 Managing organization culture and politics; 7 Designing effective awareness programs; 8 Transforming organization attitudes and behaviour; 9 Gaining executive board and business buy-in; 10 Designing security systems that work; 11 Harnessing the power of the organization; In conclusion; Bibliography; Index 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Information technology  |x Security measures. 
650 0 |a Industries  |x Security measures. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Management  |x Employee participation. 
650 0 |a Electronic data processing departments  |x Security measures. 
650 0 |a Management information systems  |x Human factors. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Industrie  |x Sécurité  |x Mesures. 
650 6 |a Centres de traitement de l'information  |x Sécurité  |x Mesures. 
650 6 |a Systèmes d'information de gestion  |x Facteurs humains. 
650 6 |a Personnel  |x Participation à la gestion. 
650 7 |a BUSINESS & ECONOMICS  |x Workplace Culture.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Corporate Governance.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Leadership.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Development.  |2 bisacsh 
650 7 |a Sécurité.  |2 eclas 
650 7 |a Protection des données.  |2 eclas 
650 7 |a Informatique.  |2 eclas 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Electronic data processing departments  |x Security measures  |2 fast 
650 7 |a Industries  |x Security measures  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
650 7 |a Management  |x Employee participation  |2 fast 
650 7 |a Management information systems  |x Human factors  |2 fast 
758 |i has work:  |a Managing the human factor in information security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFrVP8cC76DPHywfkXmtDq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Lacey, David.  |t Managing the human factor in information security.  |d Chichester, England ; Hoboken, N.J. : Wiley, ©2009  |z 9780470721995  |z 0470721995  |w (DLC) 2008043719  |w (OCoLC)246887223 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=437522  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH16076420 
938 |a Coutts Information Services  |b COUT  |n 9822664 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL437522 
938 |a EBSCOhost  |b EBSC  |n 267796 
938 |a Internet Archive  |b INAR  |n managinghumanfac0000lace 
938 |a YBP Library Services  |b YANK  |n 3041617 
994 |a 92  |b IZTAP